Deck 22: Computer Benefits and Risks

Full screen (f)
exit full mode
Question
A(n) ____________________ or "Web bug" is a 1x1 pixel graphic on a Web page.
Use Space or
up arrow
down arrow
to flip the card.
Question
The marketing firms that distribute ad-serving cookies claim that this data is simply used to select and display ads that might interest you.
Question
Copyright law prohibits all copying.
Question
You can violate your own privacy by unintentionally releasing information about yourself that can be exploited by aggressive marketing companies, hackers, and criminals.
Question
____________________ occurs when someone obtains your personal information and uses it without your permission to commit fraud or other crimes.
Question
A copyright notice, such as "Copyright 2010 eCourse Inc." is required by law in order to be protected by copyright.
Question
____________________ refers to any physical method used to prevent works from being copied.
Question
Personal information can be defined as any data that is associated with you as an individual.
Question
____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.
Question
____________________ is any technology that surreptitiously gathers information.
Question
Web site ____________________, the process of intentionally blocking access to certain sites, is controversial.
Question
The material published on Web sites, in blogs, and in other online forums is protected by copyright.
Question
You can make copies for your own use and you can make copies under ____________________ regulations, which allow you to copy small excerpts of copyrighted works for use in educational materials and critical reviews.
Question
Viruses spread themselves from one computer to another.
Question
____________________ refers to intangibles, such as ideas, music, art, photos, logos, movies, and programs, that are the result of creativity and intellectual effort.
Question
Personal information about your health, grades, charitable donations, and purchases is stored in a very limited number of places.
Question
A(n) ____________________ is issued by a certificate authority that essentially vouches for the certificate holder's identity.
Question
Legitimate macros are used to automate common word processing or spreadsheet tasks.
Question
Unfortunately, there is no software available to block banner and pop-up ads altogether.
Question
In order to gain access to a(n) ____________________ Web site, you typically have to register for an account and password.
Question
____ software is designed to analyze the flow of traffic entering your computer from a network.

A)Port connection
B)Wireless connection
C)Encryption
D)Firewall
Question
A ____ uses a home-based computer and telecommunications equipment to perform work-related tasks.

A)telecommuter
B)teleworker
C)either a.or b.
D)neither a.nor b.
Question
Small ____ tags sewn into clothing communicate with inventory tracking systems.

A)Radio Frequency Identification
B)Wireless Frequency Identification
C)Radio Signal
D)Wireless Signal
Question
The original wireless encryption was called ____ and was designed to provide a level of confidentiality similar to that of a wired network.

A)WAP
B)WEP
C)WIP
D)WOP
Question
Most malicious code is stored in executable files, usually with ____ file name extensions.

A)exe
B)doc
C)xls
D)mp3
Question
____ is the study of work and work environments, with the goal being to make work environments safer and healthier.

A)Robotics
B)Telecommunications
C)Ergonomics
D)Economics
Question
<strong>  Referring to the figure above, if these were your settings, ____ would be scanned for viruses.</strong> A)all of your e-mail messages B)none of your e-mail messages C)all of your e-mail attachments only D)all of your outgoing e-mail only <div style=padding-top: 35px>
Referring to the figure above, if these were your settings, ____ would be scanned for viruses.

A)all of your e-mail messages
B)none of your e-mail messages
C)all of your e-mail attachments only
D)all of your outgoing e-mail only
Question
A ____ is a snapshot of your computer settings and are essentially backups of the Windows Registry.

A)help point
B)defragmentation history
C)backup
D)restore point
Question
A ____ worm makes use of information on an infected computer to mail itself to everyone listed in the e-mail address book.

A)mass-mailing
B)friendly
C)post office
D)hello
Question
<strong>  Referring to the figure above, you have 229 days of the Norton subscription remaining, and LiveUpdate was run eight minutes ago.To stay current, always make sure your ____ is/are up-to-date.</strong> A)antivirus software subscription B)virus definitions C)both a.and b. D)neither a.nor b. <div style=padding-top: 35px>
Referring to the figure above, you have 229 days of the Norton subscription remaining, and LiveUpdate was run eight minutes ago.To stay current, always make sure your ____ is/are up-to-date.

A)antivirus software subscription
B)virus definitions
C)both a.and b.
D)neither a.nor b.
Question
A computer ____ is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.

A)worm
B)virus
C)Trojan horse
D)phishing scam
Question
<strong>  In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____.</strong> A)leave this one on too, for double security B)turn this one off, you should not have two firewalls running C)do nothing, your system will turn the firewalls on and off automatically D)none of the above <div style=padding-top: 35px>
In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____.

A)leave this one on too, for double security
B)turn this one off, you should not have two firewalls running
C)do nothing, your system will turn the firewalls on and off automatically
D)none of the above
Question
Some Trojan horses contain a virus or a worm, which can replicate and spread.Virus experts call this a ____ threat because it combines more than one type of malicious code.

A)blended
B)combo
C)confused
D)mixed-up
Question
A ____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

A)stampede
B)denial of service
C)rampage
D)buzz
Question
____ makes it possible for shoppers to purchase merchandise using their computers.

A)E-world
B)E-commerce
C)E-spend
D)E-business
Question
Often hackers transmit ____ that circulate over the Internet looking for unsecured computer systems.

A)phish feelers
B)phish felons
C)port jets
D)port probes
Question
To access Windows Firewall when using Windows, type "____" in the Start menu's Search box.

A)Security
B)Firewall
C)Help
D)Start
Question
When setting up wireless encryption, you will create an encryption ____, which works like a password.

A)key
B)number
C)password
D)name
Question
____ key, also referred to as "personal mode," is a type of WPA used on most home networks.

A)Authorized
B)Pre-authorized
C)Shared
D)Pre-shared
Question
Unlike a virus, which is designed to spread from file to file, a worm is designed to spread from computer to computer over ____.

A)local area networks
B)the Internet
C)both a.and b.
D)neither a.nor b.
Question
When you publish your own material online, it is automatically covered by ____.

A)trademark
B)copyright
C)patent
D)libel insurance
Question
The term ____ refers to any program or set of program instructions designed to surreptitiously enter a computer and disrupt its normal operations.

A)virus code
B)malicious code
C)virus script
D)malicious script
Question
The information that your antivirus software uses to identify and eradicate malicious code is stored in one or more files usually referred to as "virus ____."

A)medicines
B)definitions
C)antidotes
D)scripts
Question
The Software Information Industry Association (SIIA) is trying to stop illegal software ____.

A)distribution
B)development
C)encryption
D)archiving
Question
The process of eradicating a virus-sometimes called "____"-might include deleting the virus code from files or deleting infected files.

A)disinfecting
B)spraying
C)exterminating
D)erasing
Question
<strong>  In the figure above, the Key 1: that is shown is also referred to as a(n) ____ key.</strong> A)encryption B)part-time C)password D)portal <div style=padding-top: 35px>
In the figure above, the "Key 1:" that is shown is also referred to as a(n) ____ key.

A)encryption
B)part-time
C)password
D)portal
Question
Although ____ property can be fixed in tangible media the underlying "property" is not necessarily tied to a particular media.

A)smart
B)intellectual
C)mathematical
D)performance
Question
In the United States, ____ prevents health care organizations from distributing patient information without written permission, and gives patients the right to amend incorrect or missing information in their records.

A)HIPAA
B)LIPAA
C)MIPAA
D)KIPAA
Question
A typical ____ scam begins with a faked e-mail message that seems to be an official notice from a trusted source, such as a credit card company, online payment service, software vendor, or bank.

A)spam
B)phishing
C)fox
D)virus
Question
You can check the list of cookies on your computer to look for ad-serving cookies.They are typically generated by sites you have never visited and sometimes contain the word "ad" or "____."

A)dog
B)log
C)bog
D)cog
Question
____ use allows you to insert fragments of literary works in research papers without first gaining permission from their authors.

A)Intellectual
B)Fair
C)Educational
D)Part-time
Question
<strong>  The figure above shows the ____ configuration software.</strong> A)router's B)computer's C)Internet connection D)operating system <div style=padding-top: 35px>
The figure above shows the ____ configuration software.

A)router's
B)computer's
C)Internet connection
D)operating system
Question
In the United States, the Digital Millennium Copyright Act of ____ updated many key aspects of intellectual property law to meet the challenges of new digital realities.

A)1998
B)2002
C)2006
D)2008
Question
____ usually protect inventions from being used without permission from the inventor.

A)Trademarks
B)Copyrights
C)Patents
D)Privacy Policies
Question
____ typically protect corporate logos and product names.

A)Trademarks
B)Patents
C)Copyrights
D)Privacy Policies
Question
____ typically protect works such as software, photos, movies, and music.

A)Copyrights
B)Trademarks
C)Patents
D)Privacy Policies
Question
A data file with a .doc or .xls extension can sometimes contain a ____ virus.

A)formula
B)function
C)micro
D)macro
Question
____ violations take place when your personal information is distributed or your online activities are tracked without your permission.

A)Virus
B)Trojan
C)Privacy
D)Encryption
Question
Several software publishers offer tools that filter out inappropriate Web sites.____ typically comes pre-loaded with a long list of sites that are not child-friendly.

A)Net Nanny
B)Windows Parental Controls
C)both a.and b.
D)neither a.nor b.
Question
The music industry, the Recording Industry Association of America (RIAA) is attempting to stop rampant ____ music sharing on the Internet.

A)DVD
B)Radio signal
C)MP3
D)CD
Question
Case 22-1
Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below.
A professor contacts Genevieve saying that he thinks he has a computer virus, but he has been on vacation for a month, and has not used his computer.Genevieve explains that ____.

A)it can be a virus because viruses can lurk for days or months inside a computer
B)it can be a virus, caught by the computer while it was turned off
C)it cannot be a virus as he would have known about the virus before he left on vacation
D)none of the above
Question
HIPAA helps keep your medical information private and prevents abusive practices, such as when a cash-strapped health care organization sells a list of its pregnant patients to a baby-formula marketing company._________________________
Question
A Trojan ant is a computer program that seems to perform one function while actually doing something else, and is not designed to make copies of itself._________________________
Question
Gossip is defined as false and malicious statements published for the purpose of damaging the reputation of a living person._________________________
Question
Explain how you can use a router instead of a firewall to protect your computer from intrusions.
Question
Coded software scrambles your data by using a multi-digit key._________________________
Question
Copyright law makes it illegal to copy and distribute protected works without the permission of the author or the author's representative._________________________
Question
One of the forms of malicious code is worms.Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.
Question
Many businesses that collect data online offer a(n) privacy policy that describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access._________________________
Question
Some Web sites feature banner ads supplied by third-party marketing firms.If you click the ad, this third party can create an ad-serving virus and use it to track your activities at any site containing banner ads from that third party._________________________
Question
Case 22-1
Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below.
Genevieve has received three reports today, from students, about a computer virus that is spreading from one computer to another automatically with the name "Hello Friend." Genevieve knows the problem is not a virus because computer viruses ____.

A)are never found on a college campus
B)don't spread from one computer to another automatically
C)never have names
D)none of the above
Question
Virus software is a set of utility programs that looks for and eradicates viruses and worms._________________________
Question
A virus clue is a section of code, such as a unique series of instructions, that can be used to identify a known virus or worm, much as a fingerprint is used to identify an individual._________________________
Question
Information security refers to the techniques used to protect information from unauthorized access, damage, disclosure, loss, modification, or use._________________________
Question
Case 22-1
Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below.
Genevieve drafts a letter to the student body saying to be careful about opening executable files.Genevieve also states that malicious code can be included in ____ files.

A)sys or .com
B)bin or .vbs
C)scr or .ovl
D)any of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 22: Computer Benefits and Risks
1
A(n) ____________________ or "Web bug" is a 1x1 pixel graphic on a Web page.
clear GIF
2
The marketing firms that distribute ad-serving cookies claim that this data is simply used to select and display ads that might interest you.
True
3
Copyright law prohibits all copying.
False
4
You can violate your own privacy by unintentionally releasing information about yourself that can be exploited by aggressive marketing companies, hackers, and criminals.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
____________________ occurs when someone obtains your personal information and uses it without your permission to commit fraud or other crimes.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
A copyright notice, such as "Copyright 2010 eCourse Inc." is required by law in order to be protected by copyright.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
____________________ refers to any physical method used to prevent works from being copied.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Personal information can be defined as any data that is associated with you as an individual.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
____________________ is any technology that surreptitiously gathers information.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Web site ____________________, the process of intentionally blocking access to certain sites, is controversial.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
The material published on Web sites, in blogs, and in other online forums is protected by copyright.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
You can make copies for your own use and you can make copies under ____________________ regulations, which allow you to copy small excerpts of copyrighted works for use in educational materials and critical reviews.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Viruses spread themselves from one computer to another.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ refers to intangibles, such as ideas, music, art, photos, logos, movies, and programs, that are the result of creativity and intellectual effort.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Personal information about your health, grades, charitable donations, and purchases is stored in a very limited number of places.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____________________ is issued by a certificate authority that essentially vouches for the certificate holder's identity.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Legitimate macros are used to automate common word processing or spreadsheet tasks.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Unfortunately, there is no software available to block banner and pop-up ads altogether.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
In order to gain access to a(n) ____________________ Web site, you typically have to register for an account and password.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
____ software is designed to analyze the flow of traffic entering your computer from a network.

A)Port connection
B)Wireless connection
C)Encryption
D)Firewall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ uses a home-based computer and telecommunications equipment to perform work-related tasks.

A)telecommuter
B)teleworker
C)either a.or b.
D)neither a.nor b.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Small ____ tags sewn into clothing communicate with inventory tracking systems.

A)Radio Frequency Identification
B)Wireless Frequency Identification
C)Radio Signal
D)Wireless Signal
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
The original wireless encryption was called ____ and was designed to provide a level of confidentiality similar to that of a wired network.

A)WAP
B)WEP
C)WIP
D)WOP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Most malicious code is stored in executable files, usually with ____ file name extensions.

A)exe
B)doc
C)xls
D)mp3
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
____ is the study of work and work environments, with the goal being to make work environments safer and healthier.

A)Robotics
B)Telecommunications
C)Ergonomics
D)Economics
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
<strong>  Referring to the figure above, if these were your settings, ____ would be scanned for viruses.</strong> A)all of your e-mail messages B)none of your e-mail messages C)all of your e-mail attachments only D)all of your outgoing e-mail only
Referring to the figure above, if these were your settings, ____ would be scanned for viruses.

A)all of your e-mail messages
B)none of your e-mail messages
C)all of your e-mail attachments only
D)all of your outgoing e-mail only
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ is a snapshot of your computer settings and are essentially backups of the Windows Registry.

A)help point
B)defragmentation history
C)backup
D)restore point
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
A ____ worm makes use of information on an infected computer to mail itself to everyone listed in the e-mail address book.

A)mass-mailing
B)friendly
C)post office
D)hello
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
<strong>  Referring to the figure above, you have 229 days of the Norton subscription remaining, and LiveUpdate was run eight minutes ago.To stay current, always make sure your ____ is/are up-to-date.</strong> A)antivirus software subscription B)virus definitions C)both a.and b. D)neither a.nor b.
Referring to the figure above, you have 229 days of the Norton subscription remaining, and LiveUpdate was run eight minutes ago.To stay current, always make sure your ____ is/are up-to-date.

A)antivirus software subscription
B)virus definitions
C)both a.and b.
D)neither a.nor b.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
A computer ____ is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.

A)worm
B)virus
C)Trojan horse
D)phishing scam
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
<strong>  In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____.</strong> A)leave this one on too, for double security B)turn this one off, you should not have two firewalls running C)do nothing, your system will turn the firewalls on and off automatically D)none of the above
In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____.

A)leave this one on too, for double security
B)turn this one off, you should not have two firewalls running
C)do nothing, your system will turn the firewalls on and off automatically
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
Some Trojan horses contain a virus or a worm, which can replicate and spread.Virus experts call this a ____ threat because it combines more than one type of malicious code.

A)blended
B)combo
C)confused
D)mixed-up
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
A ____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

A)stampede
B)denial of service
C)rampage
D)buzz
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
____ makes it possible for shoppers to purchase merchandise using their computers.

A)E-world
B)E-commerce
C)E-spend
D)E-business
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Often hackers transmit ____ that circulate over the Internet looking for unsecured computer systems.

A)phish feelers
B)phish felons
C)port jets
D)port probes
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
To access Windows Firewall when using Windows, type "____" in the Start menu's Search box.

A)Security
B)Firewall
C)Help
D)Start
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
When setting up wireless encryption, you will create an encryption ____, which works like a password.

A)key
B)number
C)password
D)name
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
____ key, also referred to as "personal mode," is a type of WPA used on most home networks.

A)Authorized
B)Pre-authorized
C)Shared
D)Pre-shared
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Unlike a virus, which is designed to spread from file to file, a worm is designed to spread from computer to computer over ____.

A)local area networks
B)the Internet
C)both a.and b.
D)neither a.nor b.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
When you publish your own material online, it is automatically covered by ____.

A)trademark
B)copyright
C)patent
D)libel insurance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
The term ____ refers to any program or set of program instructions designed to surreptitiously enter a computer and disrupt its normal operations.

A)virus code
B)malicious code
C)virus script
D)malicious script
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
The information that your antivirus software uses to identify and eradicate malicious code is stored in one or more files usually referred to as "virus ____."

A)medicines
B)definitions
C)antidotes
D)scripts
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
The Software Information Industry Association (SIIA) is trying to stop illegal software ____.

A)distribution
B)development
C)encryption
D)archiving
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
The process of eradicating a virus-sometimes called "____"-might include deleting the virus code from files or deleting infected files.

A)disinfecting
B)spraying
C)exterminating
D)erasing
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
<strong>  In the figure above, the Key 1: that is shown is also referred to as a(n) ____ key.</strong> A)encryption B)part-time C)password D)portal
In the figure above, the "Key 1:" that is shown is also referred to as a(n) ____ key.

A)encryption
B)part-time
C)password
D)portal
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Although ____ property can be fixed in tangible media the underlying "property" is not necessarily tied to a particular media.

A)smart
B)intellectual
C)mathematical
D)performance
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
In the United States, ____ prevents health care organizations from distributing patient information without written permission, and gives patients the right to amend incorrect or missing information in their records.

A)HIPAA
B)LIPAA
C)MIPAA
D)KIPAA
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
A typical ____ scam begins with a faked e-mail message that seems to be an official notice from a trusted source, such as a credit card company, online payment service, software vendor, or bank.

A)spam
B)phishing
C)fox
D)virus
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
You can check the list of cookies on your computer to look for ad-serving cookies.They are typically generated by sites you have never visited and sometimes contain the word "ad" or "____."

A)dog
B)log
C)bog
D)cog
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
____ use allows you to insert fragments of literary works in research papers without first gaining permission from their authors.

A)Intellectual
B)Fair
C)Educational
D)Part-time
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
<strong>  The figure above shows the ____ configuration software.</strong> A)router's B)computer's C)Internet connection D)operating system
The figure above shows the ____ configuration software.

A)router's
B)computer's
C)Internet connection
D)operating system
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
In the United States, the Digital Millennium Copyright Act of ____ updated many key aspects of intellectual property law to meet the challenges of new digital realities.

A)1998
B)2002
C)2006
D)2008
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
____ usually protect inventions from being used without permission from the inventor.

A)Trademarks
B)Copyrights
C)Patents
D)Privacy Policies
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
____ typically protect corporate logos and product names.

A)Trademarks
B)Patents
C)Copyrights
D)Privacy Policies
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
____ typically protect works such as software, photos, movies, and music.

A)Copyrights
B)Trademarks
C)Patents
D)Privacy Policies
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
A data file with a .doc or .xls extension can sometimes contain a ____ virus.

A)formula
B)function
C)micro
D)macro
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
____ violations take place when your personal information is distributed or your online activities are tracked without your permission.

A)Virus
B)Trojan
C)Privacy
D)Encryption
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Several software publishers offer tools that filter out inappropriate Web sites.____ typically comes pre-loaded with a long list of sites that are not child-friendly.

A)Net Nanny
B)Windows Parental Controls
C)both a.and b.
D)neither a.nor b.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
The music industry, the Recording Industry Association of America (RIAA) is attempting to stop rampant ____ music sharing on the Internet.

A)DVD
B)Radio signal
C)MP3
D)CD
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Case 22-1
Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below.
A professor contacts Genevieve saying that he thinks he has a computer virus, but he has been on vacation for a month, and has not used his computer.Genevieve explains that ____.

A)it can be a virus because viruses can lurk for days or months inside a computer
B)it can be a virus, caught by the computer while it was turned off
C)it cannot be a virus as he would have known about the virus before he left on vacation
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
HIPAA helps keep your medical information private and prevents abusive practices, such as when a cash-strapped health care organization sells a list of its pregnant patients to a baby-formula marketing company._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
A Trojan ant is a computer program that seems to perform one function while actually doing something else, and is not designed to make copies of itself._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Gossip is defined as false and malicious statements published for the purpose of damaging the reputation of a living person._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
Explain how you can use a router instead of a firewall to protect your computer from intrusions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
Coded software scrambles your data by using a multi-digit key._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
Copyright law makes it illegal to copy and distribute protected works without the permission of the author or the author's representative._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
One of the forms of malicious code is worms.Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Many businesses that collect data online offer a(n) privacy policy that describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Some Web sites feature banner ads supplied by third-party marketing firms.If you click the ad, this third party can create an ad-serving virus and use it to track your activities at any site containing banner ads from that third party._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Case 22-1
Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below.
Genevieve has received three reports today, from students, about a computer virus that is spreading from one computer to another automatically with the name "Hello Friend." Genevieve knows the problem is not a virus because computer viruses ____.

A)are never found on a college campus
B)don't spread from one computer to another automatically
C)never have names
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Virus software is a set of utility programs that looks for and eradicates viruses and worms._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
A virus clue is a section of code, such as a unique series of instructions, that can be used to identify a known virus or worm, much as a fingerprint is used to identify an individual._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Information security refers to the techniques used to protect information from unauthorized access, damage, disclosure, loss, modification, or use._________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Case 22-1
Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below.
Genevieve drafts a letter to the student body saying to be careful about opening executable files.Genevieve also states that malicious code can be included in ____ files.

A)sys or .com
B)bin or .vbs
C)scr or .ovl
D)any of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.